Home Cart Quotation About-Us
www.ChineseStandard.net
SEARCH

GB/T 17902.3-2005 English PDF

US$874.00 · In stock
Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email.
GB/T 17902.3-2005: Information technology -- Security techniques -- Digital signatures with appendix -- Part 3: Certificate-based mechanisms
Status: Valid
Standard IDUSDBUY PDFLead-DaysStandard Title (Description)Status
GB/T 17902.3-2005874 Add to Cart 4 days Information technology -- Security techniques -- Digital signatures with appendix -- Part 3: Certificate-based mechanisms Valid

Similar standards

GB/T 18336.1   GB/T 18336.2   GB/T 18336.3   GB/T 17903.1   GB/T 17903.3   GB/T 17902.1   

Basic data

Standard ID: GB/T 17902.3-2005 (GB/T17902.3-2005)
Description (Translated English): Information technology. Security techniques. Digital signatures with appendix. Part 3: Certificate-based mechanisms
Sector / Industry: National Standard (Recommended)
Classification of Chinese Standard: L80
Classification of International Standard: 35.040
Word Count Estimation: 38,363
Date of Issue: 2005-04-19
Date of Implementation: 2005-10-01
Adopted Standard: ISO/IEC 14888-3-1998, IDT
Regulation (derived from): Announcement of Newly Approved National Standards No. 6 of 2005 (No. 80 overall)
Issuing agency(ies): General Administration of Quality Supervision, Inspection and Quarantine of the People Republic of China, China National Standardization Administration Committee
Summary: This standard specifies the appendix with the digital signature of the certificate -based mechanism. In particular, this section provides: signature of the certificate -based mechanism for a general description of its security is based on the use Abelian discrete logarithm problem is hard (see Chapter 6). Certificate-based signature scheme a general description of its security mechanism is based on the difficulty of factoring (see Chapter 7). Arbitrary length messages using certificate-based mechanisms with appendix variety of conventional digital signature mechanism (see Appendix A and Appendix B).

GB/T 17902.3-2005: Information technology -- Security techniques -- Digital signatures with appendix -- Part 3: Certificate-based mechanisms


---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information technology.Security techniques.Digital signatures with appendix.Part 3. Certificate-based mechanisms ICS 35.040 L80 National Standards of People's Republic of China GB/T 17902.3-2005/ISO /IEC 14888-3.1998 Information technology security technology with digital signature of the appendix Part 3. Certificate-based mechanisms (ISO /IEC 14888-3..1998, IDT) Released on.2005-04-19 Implemented.2005-10-01 General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China China National Standardization Administration issued

Content

Foreword III 1 Scope 1 2 Normative references 1 3 Overview 1 4 Terms and Definitions 2 5 symbols and notation 2 6 Digital signature mechanism based on discrete logarithm 2 6.1 Key Generation Process 2 6.2 Signature Process 3 6.3 Verification Process 4 7 Factorization-based digital signature mechanism 6 7.1 Key Generation Process 6 7.2 Signature Process 6 7.3 Verification Process 7 Appendix A (Normative) Example 8 of certificate-based digital signature with appendix based on discrete logarithm A. 1 Example 8 based on non-elliptic curve A. 1.0 Symbol and notation 8 A. 1.1 Digital Signature Algorithm (DSA) 8 A. 1.2 Pointcheval/Vaudenay Signature 10 A. 2 Example 12 based on elliptic curve A. 2.1 Elliptic Curve DSA 12 Appendix B (Normative) Example of factor-based certificate-based digital signature with appendix 14 B. 1 Hash based digital signature 14 based on GB 15851 B. 1.1 Generation of domain parameters 14 B. 1.2 Generation of Signature Keys and Authentication Keys 14 B. 1.3 Signature Process 14 B. 1.4 Verification Process 15 B. 2 ESIGN 15 B. 2.1 Generation of domain parameters 15 B. 2.2 Generation of Signature Keys and Authentication Keys 15 B. 2.3 Signature Process 15 B. 2.4 Verification Process 16 Appendix C (informative) FIPSPUB186 prime number P and Q generation 17 Appendix D (informative) Elliptic Curve Mathematical Background 18 D. 1 elliptic curve and point 18 D. 1.1 Elliptic Curve Addition Rule on FP 18 Appendix E (informative) Numerical example 20 of certificate-based digital signature with appendix GB/T 17902.3-2005/ISO /IEC 14888-3.1998 E. 1 Digital Signature Algorithm (DSA) 20 E. 1.1 DSA parameters 20 E. 1.2 DSA Signing Key and Verification Key 20 E. 1.3 DSA data for each message 20 E. 1.4 DSA Signature 20 E. 1.5 DSA verification value 20 E. 2 Pointcheval/vaudenay signature algorithm 20 E. 2.1 Pointcheval/vaudenay parameter 20 E. 2.2 Pointcheval/vaudenay Signing Key and Verification Key 21 E. 2.3 Pointcheval/vaudenay data for each message 21 E. 2.4 Pointcheval/vaudenay signature 21 E. 2.5 Pointcheval/vaudenay verification value 21 E. 3 elliptic curve DSA 21 E. 4 Digital signature with hash based on GB 15851-1995 23 E. 4.1 Example 23 where 狏 is odd (狏=3) E. 4.2 Example 25 where 狏 is even (狏=2) E. 5 ESIGN Signature Algorithm 27 E. 5.1 ESIGN Domain Parameters 27 E. 5.2 Signing Key and Verification Key 27 E. 5.3 ESIGN Signature Process 27 E. 5.4 ESIGN Verification 29 Appendix F (informative) Features of the selected signature scheme 31 Appendix G (informative appendix) Patent Information 32 Reference 33 Figure 1 Signature process with random evidence 4 Figure 2 Verification process with randomized evidence 5 GB/T 17902.3-2005/ISO /IEC 14888-3.1998

Foreword

GB/T 17902 "Information Technology Security Technology with Digital Signature of the Appendix" consists of the following parts. Part 1. Overview; Part 2. Identity-based mechanisms; Part 3. Certificate-based mechanisms. This part is the third part of GB/T 17902, which is equivalent to the international standard ISO /IEC 14888-3..1998 "Information Technology Safety Technology" Digital signature for appendix with appendix Part 3. Certificate-based mechanism (English version). Appendix A and Appendix B of this part are normative appendices, and Appendix C to Appendix G are informative appendices. This part is proposed by the Ministry of Information Industry of the People's Republic of China This part is under the jurisdiction of the National Information Security Standardization Technical Committee; This part was drafted by China Electronics Technology Standardization Institute and State Key Laboratory of Information Security. The main drafters of this section. Ye Maofeng, Chen Xing, Luo Fengying, Hu Lei, Ye Dingfeng, Zhang Zhenfeng, Huang Jiaying. GB/T 17902.3-2005/ISO /IEC 14888-3.1998 Information technology security technology with digital signature of the appendix Part 3. Certificate-based mechanisms

1 Scope

GB/T 17902 specifies a digital signature mechanism with an appendix for messages of any length and is suitable for providing raw data identification and non-repudiation. And data integrity programs. This part of GB/T 17902 specifies a certificate-based digital signature mechanism with an appendix. In particular, this section provides. 1) A general description of a certificate-based signature mechanism whose security is based on the difficulty of discrete logarithm problems on the switched groups used (see Chapter 6). 2) A general description of the certificate-based signature mechanism whose security mechanisms are based on the difficulty of factorization (see Chapter 7). 3) Various conventional digital signature mechanisms with appendices based on the certificate mechanism using arbitrary length messages (see Appendix A and Appendix B).

2 Normative references

The terms of the following documents become the provisions of this part by reference in this part of GB/T 17902. Quotations with dated , all subsequent amendments (not including errata content) or revisions do not apply to this section, however, encouragement is achieved under this section The parties to the agreement study whether the latest versions of these documents can be used. For undated references, the latest edition applies to this section. GB 15851-1995 Information technology security technology Digital signature scheme with message recovery (idt ISO /IEC 9796.1991) GB/T 17902.1-1999 Information technology security technology with digital signatures in appendix Part 1. Overview GB/T 17902.2-2005 Information technology security technology with digital signatures in appendix Part 2. Identity-based mechanisms (ISO /IEC 14888-2..1999, IDT) GB/T 18238.3-2002 Information technology security techniques - Hash function - Part 3. Dedicated hash function (idt ISO /IEC 10118-3.1998) Information technology - Security techniques - Digital signature schemes with message recovery - Part 2. Using hashes Function mechanism ISO /IEC 10118-4.1998 - Information technology - Security techniques - Hash function - Part 4

3 Overview

The definitions, symbols, numerical lengths and notations given in GB/T 17902.1-1999 are used in this part of GB/T 17902. The verification of the digital signature requires the verification key of the signature entity. Therefore, the authenticator must associate the correct authentication key with the signature entity. stand up. For certificate-based mechanisms, this association must be provided by some kind of certificate. For example, the verification key is taken from a certificate. The purpose of this part of GB/T 17902 is to specify the following procedures and functions of the general model described in GB/T 17902.1-1999. a) The process of generating a key 1) Generate domain parameters 2) Generate signature and verification key b) the process of forming a signature 1) (Optional) Form a pre-signature 2) Prepare a message for the signature GB/T 17902.3-2005/ISO /IEC 14888-3.1998
......
Image     

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GB/T 17902.3-2005_English be delivered?

Answer: Upon your order, we will start to translate GB/T 17902.3-2005_English as soon as possible, and keep you informed of the progress. The lead time is typically 2 ~ 4 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GB/T 17902.3-2005_English with my colleagues?

Answer: Yes. The purchased PDF of GB/T 17902.3-2005_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.